نتایج جستجو برای: order and security

تعداد نتایج: 16911382  

NAZANIN PILEVERI SOMAYYEH SHAFEGHATI

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

Journal: :Int. J. Game Theory 2003
Srihari Govindan Tilman Klumpp

We extend the results of Blume, Brandenberger, and Dekel (1991b) to obtain a finite characterization of perfect equilibria in terms of lexicographic probability systems (LPSs). The LPSs we consider are defined over individual strategy sets and thus capture the property of independence among players’ actions. Our definition of a product LPS over joint actions of the players is shown to be canoni...

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

ژورنال: یافته 2017
شکری جوکاری, سمیرا, فلاحی, ابراهیم, قاضی, شیرین,

Background: This paper aims to examine the association between food security and passive defense and the position of food security in this context. Given the role of healthy manpower in the development of a country and the importance of healthy food and nutrition in human health as the core center of development and the main confronting factor with foreign threats, in this paper, we first discu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم تربیتی و روانشناسی 1391

abstract: research purpose: the purpose of this research is to identify academic databases assessment factors and criteria at law and political science majors. the necessity of this research is to distinguish academic databases assessment factors and criteria and to identify the most important ones and rank them in order to select an appropriate database according to students’ and faculty memb...

Journal: :international journal of political science 0

china is a vast and overpopulated country in the eastern asia whose energy security and supply is the most important factor of economic growth and consequently, economic, social and political security. by the past decades, its leaders have understood the key role of economic growth and development in the economic and political security of china. thus, they have put all their concentration on th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...

Journal: :journal of computer and robotics 0
soheila mirzagholi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran karim faez electrical engineering department, amirkabir university of technology, tehran, iran

mobile ad-hoc networks have attracted a great deal of attentions over the past few years. considering their applications, the security issue has a great significance in them. security scheme utilization that includes prevention and detection has the worth of consideration. in this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید